-
ARCUS GLOBAL LIMITED
Arcus Trading Standards is a flexible and intuitive cloud-based solution helping Trading Standard's practitioners manage all aspects of their work including inspections, investigations, monitoring, enforcement, providing advice, and managing evidence. The included mobile app supports full access and offline remote working. Enabling officers and teams to work efficiently and effectively.
-
Network 2 Supplies Ltd
N2S are the leaders in pursuit of zero waste technology, delivering a disposal service that consistently returns technology waste to maximum re-use. We can offer secure collection bins for use in data centre environments. These are then transported to N2S where the data is cleansed and the drives destroyed.
-
CDW LIMITED
Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.
-
Intercity Technology Limited
Intercity’s Managed Azure Virtual Desktop is a secure, scalable virtual desktop solution. It enables access to Windows desktops and applications from anywhere, on any device with centralised management and automated updates. Improving productivity and flexibility while reducing IT overhead. Ideal for organisations embracing remote work and cloud-based desktop solutions.
-
Boomalert Ltd
BoomAlert automates incident communication. Build bespoke communication workflows, meet requirements for critical events. Alerting workflows automate coordinated processes based on responses, time triggers, count triggers and escalation paths. Critical Alerting, Incident Management, Business Continuity, IT Monitoring, Machine-2-Machine Alerting, Event Management.
ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited.
-
Core to Cloud Ltd
Improve your organisation's resilience and ability to respond to cyberattack incidents and threats through the delivery of a series of crisis simulation exercises. The exercises are gamified with organisation relevant, interactive questions on a web interface. Full reports are shared to highlight performance and areas of improvement.
-
ADAPPT LIMITED
Progressive software development services at Adappt. We develop robust, scalable and secured web/mobile applications. Share your ideas, taking your business on a success flight! Offload manual data input and repetitive tasks to AI for accurate/speedy results. Enables employees to concentrate on value-driven work, enhancing throughput and minimizing human errors.
-
Cyberlab
Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.
-
BEYOND HOLDINGS LIMITED trading as Evouchers/Wonde
Wonde’s innovative School Edusync is a Electronic document and records management (EDRM) tool that provides a secure and automated way to provision school Learning Management Systems (LMSs) such as Google-Workspace, Microsoft-SDS, and Apple School Manager with data from a schools MIS, automatically creating, updating and deleting users, groups and classrooms.
-
BROOKCOURT SOLUTIONS LIMITED
Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.
-
SOFTCAT PLC
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Vehicle Abandonment Management solution efficiently addresses the challenges of managing abandoned vehicles in the housing sector. Our robust case management and task management capabilities streamline identification, monitoring, and resolution processes.
-
SAPPHIRE TECHNOLOGIES LIMITED
Our service delivers critical insights into the shifting dynamics in every geographic area that matters to you.
Accelerate your decision-making with contextualized OSINT data about geopolitical threats
and trends. We fuse open source, dark web, technical
sources, and original research. By dynamically linking, categorising, and
updating intelligence in real time,
-
ROCKTIME LIMITED
Rocktime's verso™ scrap metal dealer licensing software provides data validation and process transformation. Used as a stand alone system or fully integrated, verso can be tailored to mirror and improve your internal processes, and can power you mandatory, selective and additional schemes.
-
SOFTCAT PLC
oSoSys offers a rich portfolio of security products and features for device control, data loss prevention (DLP), and eDiscovery for Windows, macOS and Linux, as well as the development of applications for portable storage device encryption and enhancement. Endpoint Protector is a dedicated DLP solution with a server/client architecture.
-
YUDU Sentinel
Automated Cloud based information lines for people to call in an incident. Reporting hotlines for messages and a message handling console. Deliver crisis updates by simply typing a message with AI conversion to Voice. 27 languages supported. A low cost call centre.
-
GB Group plc
GBG IDscan’s configurable identity platform automatically recognises and classifies global Passports, ID Cards, Visas, Drivers Licenses and utility bills extracts all data fields and performs authentication checks. The technology including on-device or web SDKs, REST APIs and combined with NFC and NIST facial recognition and liveness to provide level confidence.
-
COMPUTACENTER (UK) LIMITED
Proofpoint's Complete package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration, TAP ATO & ITDR Spotlight to the Core package offerings.
-
Panacea Applications Limited
End-to-end source-to-pay (S2P). Order to delivery, goods receipt and supplier invoicing. Audit trail, reports. GDPR and PCR Compliant. Accounts payable, finance system. Supplier portals. Configurable e-Catalogue, instant pricing options. Procurement, tendering, contract lifecycle management, due diligence. DPS, Dynamic Markets, frameworks. RFQ, further-competition. Evaluation, moderation, award. Category Management. Find-a-Tender, Contracts Finder.
-
CYBIT LIMITED
Prisma Cloud offers the industry’s broadest security and compliance coverage for applications, data, and the entire cloud native technology stack throughout the development lifecycle across multi- and hybrid cloud environments. This include:
Prisma Cloud for cloud application security
Prisma Access (SASE) Cloud access security
Prisma SaaS for visibility and control
-
SOFTCAT PLC
Flowmon allows you to pinpoint the root cause of network problems, giving you complete network visibility and helps spot security threats such as Ransomware early in the attack chain with ease thanks to its AI-engine and unmatched flexibility - for on-premise, cloud and hybrid environments.
-
CYBEXER (UK) LTD
The Digital Twin Management Platform (Hybrid) provides a public/private/hybrid cloud-based, scalable solution for global digital twin technology, enhancing cybersecurity and technology testing, R&D, and training. The platform enables flexible technology testing across various configurations, fostering innovation and supports real-world applications in a globally accessible, scalable environment.
-
Network 2 Supplies Ltd
Decommissioning, data destruction and disposal of legacy equipment is central to managing a system migration to Cloud. N2S ensure any equipment or media that has previously been classified up to, and including, Official Sensitive, is destroyed and disposed of in line with CESG and WEEE regulations.
-
SOFTCAT PLC
Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.
-
CDW LIMITED
In addition to the Free and P1 features, P2 also offers Azure Active Directory Identity Protection (risk-based Conditional Access), Privileged Identity Management to help discover, restrict, and monitor administrators and their access to resources and to provide just-in-time access when needed, and Identity Governance
-
EQUINE REGISTER LIMITED
Enables the creation of a digital version of Defra's equine identity temporary documents also supports semi-wild/semi-feral populations. The Temporary Identification Documents integrate directly to the Central Equine Database and Digital Stable, can be updated in real-time and integrated with welfare and enforcement agency systems. Can be adapted for other animals.
-
Viewdeck Consulting Limited
Service provides secure, UK hosted ServiceNow environments tailored for the UK public sector, ensuring data sovereignty and compliance.
-
OPEN MEDICAL LTD
A HSCN cloud-based platform that digitises and streamlines the PICUPS and PICUPS plus tools. Facilitates efficient production of the rehabilitation prescription augmenting the continuation of the patients rehab journey. Extraction tools allow relevant data available for export to UKROC in line with best practice guidelines, creating significant efficiencies for clinicians.
-
NAIMURI LIMITED
Providing Data Science capability enabling organisations to maximise value & intelligence from data. We have expertise in Natural language processing (NLP), Computer Vision, Data Synthesis, Data Analytics, Large Language Models (LLMs), Knowledge Graphs, and Data Governance. We employ best practices in Data Engineering, ML Engineering, MLOps and ML Assurance.
-
BLUEFORT SECURITY LIMITED
Allows organisations to protect their Active Directory Environment and Users, by the use of user behaviour analysis, MFA, Service Account Protection and ITDR